Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2022
Information technology-based revolution in music education using AHP and TOPSIS
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 26, Issue 20Pages 10957–10970https://doi.org/10.1007/s00500-022-07247-wAbstractIn today’s modern world, information and communication technologies are playing an active role in increasing the standards and quality of life for the betterment of human beings. Due to these technologies, people are now learning and experiencing ...
- research-articleNovember 2021
Research on the Scheme Construction of Hotel Intelligent System Based on Smart City Concept
ICISCAE 2021: 2021 4th International Conference on Information Systems and Computer Aided EducationPages 1619–1623https://doi.org/10.1145/3482632.3484004Social demand and the development of computer science and technology and informatization promote the demand of intelligent system engineering construction in hotels. Intelligent management includes hotel office intelligence, ordering intelligence, guest ...
- research-articleJanuary 2021
Interactive Marketing E-Commerce Recommendation System Driven by Big Data Technology
This study combs through relevant literature, adopts a combination of typical sampling and random sampling, collects three big data technology-driven interactive marketing e-commerce companies in a specific period of Sina Weibo sample data for research, ...
- research-articleOctober 2019
AFSBN: A Method of Artificial Fish Swarm Optimizing Bayesian Network for Epistasis Detection
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), Volume 18, Issue 4Pages 1369–1383https://doi.org/10.1109/TCBB.2019.2949780How to mine the interaction between SNPs (namely epistasis) efficiently and accurately must be considered when to tackle the complexity of underlying biological mechanisms. In order to overcome the defect of low learning efficiency and local optimal, this ...
- research-articleAugust 2019
Nonlinear resistive switching features of rapid-thermal-annealed aluminum nitride dielectrics with modified charge trapping behaviors
AbstractNonlinear resistive switching (RS) features of aluminum nitride (AlNx)-based resistance random access memories (RRAMs) with rapid thermal annealing (RTA) have been investigated. The operation voltages of AlNx-based RRAMs are improved ...
Graphical abstractDisplay Omitted
Highlights:- Nonlinear behaviors of Ir/AlNx/Ti RRAMs treated by RTA are investigated.
- ...
- research-articleMarch 2019
Fault-Tolerant Adaptive Routing in Dragonfly Networks
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 16, Issue 2Pages 259–271https://doi.org/10.1109/TDSC.2017.2693372Dragonfly networks have been widely used in the current high-performance computers or high-end servers. Fault-tolerant routing in dragonfly networks is essential. The rich interconnects provide good fault-tolerance ability for the network. A new ...
- ArticleAugust 2015
An Improved QPSO Algorithm Based on Entire Search History
DCABES '15: Proceedings of the 2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)Pages 74–77https://doi.org/10.1109/DCABES.2015.26An improved QPSO algorithm based on entire search history (ESH-QPSO) is proposed. ESH-QPSO is an integration of the entire search history scheme and a standard quantum-behaved particle swarm optimization (QPSO). It guarantees that all updated positions ...
- ArticleNovember 2014
Detecting and Defending against Sybil Attacks in Social Networks: An Overview
BWCCA '14: Proceedings of the 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and ApplicationsPages 104–112https://doi.org/10.1109/BWCCA.2014.67Sybil attacks are becoming increasingly serious in online social networks. A number of schemes to defend against Sybil attacks have been developed in the past decade. However, only a few of these schemes are widely used in real-world social networks. In ...
- articleMay 2013
Image retargeting with multifocus fisheye transformation
The Visual Computer: International Journal of Computer Graphics (VISC), Volume 29, Issue 5Pages 407–420https://doi.org/10.1007/s00371-012-0744-6Image retargeting is a technique to adapt an original image to diverse screen sizes and aspect ratios on computing devices. This paper focuses on adapting large images for a small display. Some existing methods, such as scaling, cropping, and fisheye ...
- research-articleNovember 2010
Hardware/software codesign for a fuzzy autonomous road-following system
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews (TSMCPC), Volume 40, Issue 6Pages 690–696https://doi.org/10.1109/TSMCC.2010.2049262In this research, a fuzzy logic controller is designed for vision-based autonomous road-following. Because of its high-speed response, portability, and flexibility, a field programmable gate array is applied to implement this control system. Furthermore,...
- ArticleJune 2009
A Novel Trust Model Based on Bayesian Network for Service-Oriented Grid
ICIS '09: Proceedings of the 2009 Eigth IEEE/ACIS International Conference on Computer and Information SciencePages 494–499https://doi.org/10.1109/ICIS.2009.169With the converging of grid computing and web service, grid has extended its territory from traditional computing grid to service-oriented grid, which is aiming to realize coordinated resource sharing and problem solving through service selection and ...
- ArticleNovember 2008
Bayesian Network based QoS Trustworthiness Evaluation Method in Service Oriented Grid
ICYCS '08: Proceedings of the 2008 The 9th International Conference for Young Computer ScientistsPages 293–298https://doi.org/10.1109/ICYCS.2008.390With the converging of grid computing and web service, grid has extended its territory from traditional computing grid to service oriented grid, aiming to realize coordinated resource sharing and problem solving through service selection and ...